top of page
logo white academy.png
service checkpoint.png

Protect Your Business with Check Point Harmony Endpoint

Exclusive Offer - Valid until March 28th

2150499041.jpg

Don't miss this opportunity!

Improve your company's security with Check Point Harmony Endpoint. | Receive specialized consulting and remote technical support. | Official training included.

Terms and Conditions

📌 If you are an end user, contact your authorized TD SYNNEX channel.
📌 Services are executed remotely.
📌 Includes the Official Check Point Certified Admin Course (CCSA) for 1 person.

+Opportunities

Take advantage of this opportunity and improve your security with our services.

specialized in Check Point Harmony Endpoint.

Implementation

  • Account registration in the Cloud Management portal.

  • Generation of up to 3 administrators.

  • License application.

  • Integration with Active Directory (if required).

  • Creation of installation package.

  • Configuration of up to 3 endpoint policies.

  • Configuration of up to 2 profiles for Full Disk Encryption.

  • Configuration of up to 2 profiles for Removable Media Encryption.

  • Configuration of a Threat Extraction and Threat Emulation profile.

  • Configuration of an Anti-ransomware and Antibot profile.

  • Installation of agents on up to 30 supported endpoints.

  • Knowledge transfer for installation of additional agents.

  • Delivery of technical report.

2150169847.jpg

Consulting Hours

  • Assignment of a Check Point Harmony Endpoint technology specialist.

  • Planning sessions, resolution of technical doubts and accompaniment in windows.

  • Applicable exclusively to the purchased project.

  • Not applicable for other technologies.

  • Services implemented remotely.
     

To establish the start of activities, at least 24 hours notice is required for the assignment of the engineer.

computer-engineer-typing-keyboard-writing-code-build-firewalls.jpg

Remote Support for 30 Agents | Hours of operation: 8x5

First Level

  • Recording and identification of the problem.

  • Case follow-up.

  • Corrective actions and troubleshooting.

  • Scaling to Second Level.

Second Level

  • Advanced diagnosis of the reported problem.

  • Corrective actions and troubleshooting.

  • Request for debugs (if necessary).

  • Identification of hardware related problems.

  • Scaling to manufacturer.

html-css-collage-concept-with-person.jpg
bottom of page